Privacy-first, self-hosted intake automation for GRC consulting. This is a public-safe, redacted overview that demonstrates GRC engineering capability without exposing proprietary workflows or client data.
Access the public demo (read-only): https://portal.aamcyber.work/demo
This public overview mirrors a production repo that runs automated CI and deployment:
- CI: API and UI lint/test workflows on push and pull request
- CD: portal deploy workflow on main with secrets + secure remote sync
- Gates: dependency install, lint, unit tests, and smoke checks
- Controls: secrets verification and SSH key handling for deploy
- Evidence-first intake automation with governance gates
- Multi-framework intake mapping and audit-ready summaries
- Privacy-preserving workflow orchestration
- SOC 2: CC1, CC3, CC4, CC6, CC7
- NIST CSF: ID.AM, ID.GV, ID.RA, PR.AC, PR.DS, DE.CM
- ISO 27001: A.5, A.6, A.8, A.12, A.18
flowchart TB
Client[Client] --> Portal[Pre-Intake Portal]
Portal --> Orchestrator[Workflow Orchestrator]
Orchestrator --> CRM[Case System]
Orchestrator --> Docs[Document Store]
Orchestrator --> Sign[Signature Service]
Orchestrator --> GRC[Control Mapping]
sequenceDiagram
participant Client
participant Portal
participant Orchestrator
participant Evidence
Client->>Portal: Submit intake
Portal->>Orchestrator: Validate + route
Orchestrator->>Evidence: Create intake bundle
Evidence-->>Orchestrator: Summary + control map
flowchart LR
Ext[External User] --> Portal
Portal --> Orchestrator
Orchestrator --> Data[(Evidence Store)]
Admin[Admin Access] --> Orchestrator
Data --> Audit[Audit Logs]
| Control | Evidence Signal | Purpose |
|---|---|---|
| SOC2 CC6 | Access control records | Identity and access governance |
| NIST PR.AC | Intake access logs | Authorized access validation |
| ISO A.8 | Data classification tags | Asset and data handling |
examples/giap-intake.json- sanitized intake payloadexamples/giap-summary.md- redacted executive summaryexamples/giap-control-map.md- synthetic control mapping excerptexamples/giap-evidence-manifest.json- synthetic evidence manifest
- Client submits pre-intake form.
- Orchestrator stores intake and opens a case.
- Engagement letter is generated and signed.
- Control mapping summary is produced.
- Intake package is ready for assessment.
- Deposit gate to enforce scope discipline.
- Evidence stored with minimal access paths.
- Redacted public outputs to protect IP and client privacy.
- Proprietary workflow logic, endpoints, and credentials are omitted.
- Examples are synthetic and non-client.
This is a public-safe overview. Do not use as a production system. No client data or proprietary infrastructure details are included.